Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
We determine the torsion subgroup of the group of endotrivial modules for a finite solvable group in characteristic p. We also prove that our result would hold for p-solvable groups, provided a conjecture can be proved about the case of p-nilpotent groups. ...
Given a principal bundle G hooked right arrow P -> B (each being compact, connected and oriented) and a G-invariant metric h(P) on P which induces a volume form mu(P), we consider the group of all unimodular automorphisms SAut(P, mu(P)) := {phi is an eleme ...
The binary data are often used in the medical field or in social sciences to study an effect between two groups. It can be for example the effect of a treatment between a treated and a control group. The outcome will be the number of successes and the tota ...
The direct and enantioselective functionalization of inert bonds such as carbon-hydrogen and carbon-carbon is an emerging tool towards more sustainable and efficient synthetic methods. The individual activation pathways like concerted deprotonation metalat ...
Let A be a d-dimensional smooth algebra over a perfect field of characteristic not 2. Let Um(n+1)(A)/En+1 (A) be the set of unimodular rows of length n + 1 up to elementary transformations. If n >= (d + 2)/2, it carries a natural structure of group as disc ...
We consider a group of m trusted nodes that aim to create a shared secret key K, using a state-dependent wireless broadcast channel that exists from one of the honest nodes to the rest of the nodes including a passive eavesdropper Eve. All of the trusted n ...
Ieee Service Center, 445 Hoes Lane, Po Box 1331, Piscataway, Nj 08855-1331 Usa2011
In this paper we discuss our experience designing and collecting a data corpus called ELEA (Emergent LEader Analysis), and describe the use of a light portable scenario to record small group meetings. The corpus was gathered with the aim of analyzing emerg ...
The rapid development of derandomization theory, which is a fundamental area in theoretical computer science, has recently led to many surprising applications outside its initial intention. We will review some recent such developments related to combinator ...
Let K be a field with char(K) ≠ 2. The Witt-Grothendieck ring (K) and the Witt ring W (K) of K are both quotients of the group ring ℤ[𝓖(K)], where 𝓖(K) := K*/(K*)2 is the square class group of K. Since ℤ[𝓖(K)] is integra ...
We consider a group of m trusted nodes that aim to create a shared secret key K over a wireless channel in the presence an eavesdropper Eve. We assume an erasure broadcast channel from one of the honest nodes to the rest of them including Eve. All of the t ...